|
Showing 1 - 4 of
4 matches in All Departments
Publisher's Note: Products purchased from Third Party sellers are
not guaranteed by the publisher for quality, authenticity, or
access to any online entitlements included with the product. The
stories about phishing attacks against banks are so true-to-life,
it's chilling." --Joel Dubin, CISSP, Microsoft MVP in Security
Every day, hackers are devising new ways to break into your
network. Do you have what it takes to stop them? Find out in
Hacker's Challenge 3. Inside, top-tier security experts offer 20
brand-new, real-world network security incidents to test your
computer forensics and response skills. All the latest hot-button
topics are covered, including phishing and pharming scams, internal
corporate hacking, Cisco IOS, wireless, iSCSI storage, VoIP,
Windows, Mac OS X, and UNIX/Linux hacks, and much more. Each
challenge includes a detailed explanation of the incident--how the
break-in was detected, evidence and clues, technical background
such as log files and network maps, and a series of questions for
you to solve. In Part II, you'll get a detailed analysis of how the
experts solved each incident.
Voice over Internet Protocol (VoIP) networks have freed users from
the tyranny of big telecom, allowing people to make phone calls
over the Internet at very low or no cost. But while VoIP is easy
and cheap, it's notoriously lacking in security. With minimal
effort, hackers can eavesdrop on conversations, disrupt phone
calls, change caller IDs, insert unwanted audio into existing phone
calls, and access sensitive information. Hacking VoIP takes a dual
approach to VoIP security, explaining its many security holes to
hackers and administrators. If you're serious about security, and
you either use or administer VoIP, you should know where VoIP's
biggest weaknesses lie and how to shore up your security. And if
your intellectual curiosity is leading you to explore the
boundaries of VoIP, Hacking VoIP is your map and guidebook. Hacking
VoIP will introduce you to every aspect of VoIP security, both in
home and enterprise implementations. You'll learn about popular
security assessment tools, t
Publisher's Note: Products purchased from Third Party sellers are
not guaranteed by the publisher for quality, authenticity, or
access to any online entitlements included with the product. Lock
down next-generation Web services "This book concisely identifies
the types of attacks which are faced daily by Web 2.0 sites, and
the authors give solid, practical advice on how to identify and
mitigate these threats." --Max Kelly, CISSP, CIPP, CFCE, Senior
Director of Security, Facebook Protect your Web 2.0 architecture
against the latest wave of cybercrime using expert tactics from
Internet security professionals. Hacking Exposed Web 2.0 shows how
hackers perform reconnaissance, choose their entry point, and
attack Web 2.0-based services, and reveals detailed countermeasures
and defense techniques. You'll learn how to avoid injection and
buffer overflow attacks, fix browser and plug-in flaws, and secure
AJAX, Flash, and XML-driven applications. Real-world case studies
illustrate social networking site weaknesses, cross-site attack
methods, migration vulnerabilities, and IE7 shortcomings. Plug
security holes in Web 2.0 implementations the proven Hacking
Exposed way Learn how hackers target and abuse vulnerable Web 2.0
applications, browsers, plug-ins, online databases, user inputs,
and HTML forms Prevent Web 2.0-based SQL, XPath, XQuery, LDAP, and
command injection attacks Circumvent XXE, directory traversal, and
buffer overflow exploits Learn XSS and Cross-Site Request Forgery
methods attackers use to bypass browser security controls Fix
vulnerabilities in Outlook Express and Acrobat Reader add-ons Use
input validators and XML classes to reinforce ASP and .NET security
Eliminate unintentional exposures in ASP.NET AJAX (Atlas), Direct
Web Remoting, Sajax, and GWT Web applications Mitigate ActiveX
security exposures using SiteLock, code signing, and secure
controls Find and fix Adobe Flash vulnerabilities and DNS rebinding
attacks
Publisher's Note: Products purchased from Third Party sellers are
not guaranteed by the publisher for quality, authenticity, or
access to any online entitlements included with the product. Secure
today's mobile devices and applicationsImplement a systematic
approach to security in your mobile application development with
help from this practical guide. Featuring case studies, code
examples, and best practices, Mobile Application Security details
how to protect against vulnerabilities in the latest smartphone and
PDA platforms. Maximize isolation, lockdown internal and removable
storage, work with sandboxing and signing, and encrypt sensitive
user information. Safeguards against viruses, worms, malware, and
buffer overflow exploits are also covered in this comprehensive
resource. Design highly isolated, secure, and authenticated mobile
applications Use the Google Android emulator, debugger, and
third-party security tools Configure Apple iPhone APIs to prevent
overflow and SQL injection attacks Employ private and public key
cryptography on Windows Mobile devices Enforce fine-grained
security policies using the BlackBerry Enterprise Server Plug holes
in Java Mobile Edition, SymbianOS, and WebOS applications Test for
XSS, CSRF, HTTP redirects, and phishing attacks on WAP/Mobile HTML
applications Identify and eliminate threats from Bluetooth, SMS,
and GPS services Himanshu Dwivedi is a co-founder of iSEC Partners
(www.isecpartners.com), an information security firm specializing
in application security. Chris Clark is a principal security
consultant with iSEC Partners. David Thiel is a principal security
consultant with iSEC Partners.
|
|